From 6970faab8f8905c38bc71adfffc2b0b1683d1a74 Mon Sep 17 00:00:00 2001 From: Werner Koch Date: Wed, 3 Dec 2003 15:11:23 +0000 Subject: * mainproc.c (check_sig_and_print): Removed the "0x" again. Reverts change from 2003-10-03. * THANKS: Added Phong Nguyen, who found the Elgamal signing key problem. * configure.ac (ALL_LINGUAS): Added a Russian translation; thanks to Maxim Britov. Added Belarusion; thanks to Ales Nyakhaychyk. --- AUTHORS | 5 +++++ ChangeLog | 10 ++++++++++ NEWS | 2 ++ THANKS | 1 + configure.ac | 6 +++--- doc/gpg.texi | 36 +++++++++++++++++++++++------------- g10/ChangeLog | 5 +++++ g10/mainproc.c | 2 +- 8 files changed, 50 insertions(+), 17 deletions(-) diff --git a/AUTHORS b/AUTHORS index abbb0468d..42362fbd4 100644 --- a/AUTHORS +++ b/AUTHORS @@ -7,8 +7,12 @@ Security related bug reports: Authors ======= +Ales Nyakhaychyk Translations [be] + Birger Langkjer Translations [da] +Britov Ivanovich Translations [ru] + Daniel Resare Translations [sv] David Shaw Assignment @@ -36,6 +40,7 @@ Janusz Aleksander Urbanowicz Translations [po] Jedi Lin Translations [zh-tw] Jouni Hiltunen Translations [fi] +Tommi Vainikainen Translations [fi] Laurentiu Buzdugan Translations [ro] diff --git a/ChangeLog b/ChangeLog index 4c9818d7f..36717e3e2 100644 --- a/ChangeLog +++ b/ChangeLog @@ -1,3 +1,13 @@ +2003-12-03 Werner Koch + + Released 1.2.4rc1. + + * THANKS: Added Phong Nguyen, who found the Elgamal signing key + problem. + + * configure.ac (ALL_LINGUAS): Added a Russian translation; thanks + to Maxim Britov. Added Belarusion; thanks to Ales Nyakhaychyk. + 2003-12-02 David Shaw * NEWS: Note that Elgamal sign+encrypt keys are not part of the diff --git a/NEWS b/NEWS index a123bf10d..86dd543a4 100644 --- a/NEWS +++ b/NEWS @@ -16,6 +16,8 @@ Noteworthy changes in version 1.2.4 (unreleased) only new message that can be generated by an Elgamal sign+encrypt key is a key revocation. + * A Russian translation is included again as well as a new + Belarusian translation. Noteworthy changes in version 1.2.3 (2003-08-21) ------------------------------------------------ diff --git a/THANKS b/THANKS index 8cc7a6e54..0336d65ff 100644 --- a/THANKS +++ b/THANKS @@ -158,6 +158,7 @@ Peter Fales psfales@lucent.com Peter Gutmann pgut001@cs.auckland.ac.nz Peter Marschall Peter.Marschall@gedos.de Peter Valchev pvalchev@openbsd.org +Phong Nguyen Phong.Nguyen@ens.fr Piotr Krukowiecki piotr@pingu.ii.uj.edu.pl QingLong qinglong@bolizm.ihep.su Ralph Gillen gillen@theochem.uni-duesseldorf.de diff --git a/configure.ac b/configure.ac index 1a0aad55c..fc3760954 100644 --- a/configure.ac +++ b/configure.ac @@ -25,13 +25,13 @@ AC_PREREQ(2.52) # Remember to change the version number immediately *after* a release # and remove the "-cvs" or "rc" suffix immediately *before* a release. -AC_INIT(gnupg, 1.2.4-cvs, bug-gnupg@gnu.org) +AC_INIT(gnupg, 1.2.4rc1, bug-gnupg@gnu.org) # Set development_version to yes if the minor number is odd or you # feel that the default check for a development version is not # sufficient. -development_version=no +development_version=yes -ALL_LINGUAS="ca cs da de eo el es et fi fr gl hu id it ja nl pl pt_BR pt ro sk sv tr zh_TW" +ALL_LINGUAS="be ca cs da de eo el es et fi fr gl hu id it ja nl pl pt_BR pt ro ru sk sv tr zh_TW" AC_CONFIG_AUX_DIR(scripts) AC_CONFIG_SRCDIR(g10/g10.c) diff --git a/doc/gpg.texi b/doc/gpg.texi index 6184dea7c..25460c412 100644 --- a/doc/gpg.texi +++ b/doc/gpg.texi @@ -200,7 +200,8 @@ Create an alternate user id. @item addphoto Create a photographic user id. This will prompt for a JPEG file that -will be embedded into the user ID. +will be embedded into the user ID. A very large JPEG will make for a +very large key. @item deluid Delete a user id. @@ -375,10 +376,6 @@ of this keyserver. Don't send your complete keyring to a keyserver - select only those keys which are new or changed by you. -@item ---export-all @code{names} -Same as ---export, but also exports keys which -are not compatible with OpenPGP. - @item ---export-secret-keys @code{names} @itemx ---export-secret-subkeys @code{names} Same as ---export, but exports the secret keys instead. @@ -554,7 +551,7 @@ twice, the input data is listed in detail. @item -q, ---quiet Try to be as quiet as possible. -@item -z @code{n}, ---compress @code{n} +@item -z @code{n}, ---compress-level @code{n} Set compression level to @code{n}. A value of 0 for @code{n} disables compression. Default is to use the default compression level of zlib (normally 6). @@ -643,18 +640,18 @@ ID is bound to the key. @end table @item ---always-trust -Identical to `---trust-model always' +Identical to `---trust-model always'. This option is deprecated. @item ---keyserver @code{name} Use @code{name} as your keyserver. This is the server that ---recv-keys, ---send-keys, and --search-keys will communicate with to receive keys from, send keys to, and search for keys on. The format of the @code{name} is a URI: `scheme:[//]keyservername[:port]' The scheme is -the type of keyserver: "hkp" for the Horowitz (or compatible) -keyservers, "ldap" for the NAI LDAP keyserver, or "mailto" for the -Horowitz email keyserver. Note that your particular installation of -GnuPG may have other keyserver types available as well. Keyserver -schemes are case-insensitive. +the type of keyserver: "hkp" for the HTTP (or compatible) keyservers, +"ldap" for the NAI LDAP keyserver, or "mailto" for the Graff email +keyserver. Note that your particular installation of GnuPG may have +other keyserver types available as well. Keyserver schemes are +case-insensitive. Most keyservers synchronize with each other, so there is generally no need to send keys to more than one server. Using the command "host -l @@ -713,6 +710,12 @@ This option enables the automatic retrieving of keys from a keyserver when verifying signatures made by keys that are not on the local keyring. +Note that this option makes a "web bug" like behavior possible. +Keyserver operators can see which keys you request, so by sending you +a message signed by a brand new key (which you naturally will not have +on your local keyring), the operator can tell both your IP address and +the time when you verified the signature. + @end table @item ---import-options @code{parameters} @@ -1158,6 +1161,10 @@ behavior. Use this option to reset all previous options like ---compress-algo to OpenPGP compliant values. All PGP workarounds are disabled. +@item ---rfc2440 +Reset all packet, cipher and digest options to strict RFC-2440 +behavior. Note that this is currently the same thing as ---openpgp. + @item ---rfc1991 Try to be more RFC-1991 (PGP 2.x) compliant. @@ -1203,7 +1210,7 @@ the SHA-256 digest algorithm. @item ---force-v3-sigs @itemx ---no-force-v3-sigs OpenPGP states that an implementation should generate v4 signatures -but PGP versions 5 and higher only recognize v4 signatures on key +but PGP versions 5 through 7 only recognize v4 signatures on key material. This option forces v3 signatures for signatures on data. Note that this option overrides ---ask-sig-expire, as v3 signatures cannot have expiration dates. ---no-force-v3-sigs disables this @@ -1440,6 +1447,9 @@ from the command line, it may be necessary to quote the argument to this option to prevent the shell from treating it as multiple arguments. +@item ---no-groups +Clear the ---group list. + @item ---preserve-permissions Don't change the permissions of a secret keyring back to user read/write only. Use this option only if you really know what you are doing. diff --git a/g10/ChangeLog b/g10/ChangeLog index 7350871c4..5d4246e13 100644 --- a/g10/ChangeLog +++ b/g10/ChangeLog @@ -1,3 +1,8 @@ +2003-12-03 Werner Koch + + * mainproc.c (check_sig_and_print): Removed the "0x" again. + Reverts change from 2003-10-03. + 2003-12-02 David Shaw * g10.c (strusage, main): Show development version warning in diff --git a/g10/mainproc.c b/g10/mainproc.c index 1c70c2939..12561d966 100644 --- a/g10/mainproc.c +++ b/g10/mainproc.c @@ -1342,7 +1342,7 @@ check_sig_and_print( CTX c, KBNODE node ) tstr = asctimestamp(sig->timestamp); astr = pubkey_algo_to_string( sig->pubkey_algo ); - log_info(_("Signature made %.*s using %s key ID 0x%08lX\n"), + log_info(_("Signature made %.*s using %s key ID %08lX\n"), (int)strlen(tstr), tstr, astr? astr: "?", (ulong)sig->keyid[1] ); rc = do_check_sig(c, node, NULL, &is_expkey, &is_revkey ); -- cgit v1.2.3